Peering Analysis: GenieATM 6000 July 2013
|
|
- Branden Craig
- 7 years ago
- Views:
Transcription
1 Application Note Peering Analysis: July Application background As the internet activity is expected to expand continuously, ISPs across the globe are looking for ways to optimize their operations economically. Each ISP needs to find its own way to function in the Internet Peering Ecosystem. Having a suitable peering policy with peering business model is important for an ISP to maximize business opportunities or to minimize operation costs. A successful peering relationship should have an improved network performance while lowering operation costs or creating revenue for ISPs. GenieATM generates various peering analysis reports to assist ISPs with evaluating the suitable peering candidates and subsequently optimizing the peering relationship through traffic engineering and network planning. With BGP routing information, GenieATM can target a specific AS to carry out the relevant traffic and cost analysis as required and provide quantitative results for fair evaluation. 2. Internet Peering Ecosystem Internet Peering describes a business relationship among ISPs in which companies reciprocally provide internet access to each other s customers. Due to the difference in business and network scales, ISPs have developed various business relationships as to how they interconnect their networks and hence the Internet Peering Ecosystem. Each Internet (geopolitical) Region typically includes Tier 1 ISPs, Tier 2 ISPs, Content Provider and Enterprises, and Large Scale Network Savvy Content Providers. 2.1 Tier 1 ISPs Peering Full Mesh Peering A Tier 1 ISP has access to all of the routing tables in the regional internet solely through peering relationships. In an interconnect region, Tier 1 ISPs usually have a full mesh peering relationship with other Tier 1 ISPs and are therefore generally not interested in peering with the rest of the players ( Restrictive Peering Policy ) who can potentially be paying customers to Tier 1 ISPs. This no-peering relationship largely differentiates Tier 1 ISPs from other service providers. Genie Networks Ltd. 1
2 2.2 Tier 2 ISPs Peering Open Peering Policy Tier 2 ISPs are the ones who purchase and resell transit within an Internet region. As Tier 2 ISPs resell transit for business, they would actively look for opportunities to increase the number of peering they have to reduce their own transit costs. 2.3 Content Provider & Enterprise Peering Purchaser As content provider and enterprise players main focus is to provide and create content to customers and users, they usually do not operate networks or sell transit and hence always buy transit from ISPs No Peering Policy. 2.4 Large Scale Network Savvy Content Providers Large Scale Network Savvy Content Providers purchase transit but have also adopted peering as a strategy to lower their traffic expenses owing to their large traffic volume. This not only reduces transit costs but also gives large content providers greater control over routing to improve traffic performance hence improving end-user experience. Content Delivery Network Players have an Open Peering Policy similar to Tier 2 ISPs and peer with various ISPs aiming to deliver services from a place closer to the eyeballs by storing cached web objects at the edge of network. 2.5 Free Peering vs. Paid Peering For Free Peering relationship to be established, the traffic volume exchanged needs to be roughly balanced for both parties to make sense financially and the not-to-exceed-ration is around 2:1. In contrast, Paid Peering is a business model developed between Large Scale Network Savvy Content Providers and ISPs in which physical peering is established but is priced the same way as transits. 2.6 Peering Policy Lifecycle Within each Internet Peering Ecosystem, service providers usually go through a 5-stage peering policy lifecycle in which they have adapted different peering policies at different stages to suit their business development. At the initial stage, service providers begin as small Tier 2 ISPs and focus on reducing their IP transit cost by having as many free peering partners as they could regardless of network size; this is generally referred as an Open peering policy. As the size of peering network grows, Tier 2 ISPs would begin to concern about network performance and having control over their routings as well as making effort in meeting requirements of other selective networks. Eventually, they become selective about the networks to peer and would limit their peering activities with the more important networks by setting peering criteria. Next, large Tier 2 ISPs would have already established a large peering network except with the restrictive networks who are not interested in having new peers. At this stage, large Tier 2 ISPs would leverage external business relationships in order to secure peering with restrictive peers. Lastly, the ISPs have entered the Genie Networks Ltd. 2
3 category as restrictive Tier 1 ISPs and have established an enormous network and peer with only other large ISPs. 3. Peering Analysis 3.1 Peering Evaluation - Selective Peering Selective ISPs may receive hundreds of peering requests each year and thus require an easy solution to analyse the traffic to / from the requesting network. GenieATM supports Selective ISPs by generating the required reports and creating a set of filters to examine the traffic exchanged with the specific ASN. Selective ISPs can make decisions about the peering requests based on the statistics from the reports. Figure 3.1: Filter configuration for a Peer ASN Top-N analysis Figure 3.2: Rule-based report created for a specific AS Figure 3.1 shows how a filter is created for a specific AS to obtain the respective traffic information using GenieATM. A report is then generated (figure 3.2) to display all the traffic information coming From / Thru and the amount of traffic going To / Thru that specific AS. Such information is particularly useful when evaluating a potential peering candidate. Provided that the amount of Genie Networks Ltd. 3
4 traffic exchanged is sufficient, traffic distribution of From and To the AS should be approximately balanced and not exceeding 2:1 for the AS to be a suitable peering partner. 3.2 Peering Evaluation - Open Policy For those ISPs wish to peer with as many ISPs as possible, it is important for them to carry out some qualitative and quantitative analyses to ensure the peering relationship will be effective both financially and technically. GenieATM provides a proficient tool for ISPs to identify and evaluate a suitable new peering candidate. Figure 3.3: Top-N traffic report of peer for To and Thru traffic analysis Firstly, use the Peering Analysis Top-N reports and identify the Top ASN with the most traffic volume. Then, find an ASN and compare the In / Out traffic ratio to see if the exchanged traffic volume is approximately balanced for both parties. An ISP would consider peering with another only when the exchanged traffic volume is similar both ways. Lastly, compare the To / Through traffic distribution to check how much of the traffic is originated from the potential peer. If the majority of the traffic is originated from that AS ( To traffic), or evenly comes from several other ASs ( Thru traffic) which can be found using filter configuration to generate another Top-N report, then this AS would be the suitable candidate to peer. Conversely, if most of the traffic is Thru traffic coming from another AS then this other AS may be considered as a more suitable candidate to peer with. The same process can be reapplied again to this other AS to generate Top-N reports for further examining the traffic distribution. This both simplifies and quantifies the traffic evaluating process. GenieATM provides abundant analyses allowing ISPs to choose the right peering partners efficiently which is imperative for ISPs with open peering policy. 3.3 Peering Evaluation Restrictive Policy For ISPs with restrictive peering policy (mostly Tier 1 ISPs), the main focus of peering analysis is to enhance the network performance through network planning and traffic engineering, i.e. peering optimization. Genie Networks Ltd. 4
5 Various BGP policies can be applied to build the preferred AS path / BGP route to decide how traffics arrive and leave an AS in order to utilize ISP s network resources. GenieATM provides reports with detailed BGP attributes information which can be of useful when configuring and applying BGP policies. BGP policies can be applied to set MED (Multi-Exit Discriminator) or AS Padding to load balance inbound traffic from an AS. For the outbound traffic, BGP policies are used to favour one peer interface over another for routes from specific ASNs and can be achieved by setting Local Preference given that both interfaces have access to the same ASN. GenieATM monitors the traffic load of Interfaces of Neighbour / Sub-networks and generates various reports with different filter configurations (e.g. Prefix, Origin ASN, Peer ASN, AS Path, etc.) to breakdown BGP attribute traffic at an interface. This can be examined by creating a Filter to show the Origin ASN traffic distribution (figure 3.4) as well as creating a filter to show the Peer ASN traffic distribution of the specific ASN in order to find a specific peer to offload traffic to. GenieATM gives accurate traffic volume in the Top-N reports which can be used as reference to determine precisely how much traffic to be offloaded from the congested routes and the effect on the new route. The distribution of traffics can be evenly allocated avoiding over-offloading traffic from one to another. Reports can also be generated to show who the top talkers / listeners are that is reached via a specific peer and based on traffic analysis, may potentially peer with that AS directly. GenieATM assists ISPs with offloading traffics from expensive or unstable peers through traffic engineering to ensure network operations and optimize network performance. Figure 3.4: Rule-based report of a specific ISP Top-N Origin ASN analysis 4. Cost Analysis Direct peering with another AS would require some upfront fixed cost and equipment investments. Once the potential peering candidate is identified, further evaluation is therefore required to ensure the cost and investment needed to establish a new peer is justified on the long run. GenieATM provides the essential traffic information for carrying out the peering cost analysis. By using the Filters and rule-based reporting on GenieATM, a specific ASN of an ISP can be targeted to generate a Top-N report with traffic statistics. The potential savings with the new peering can be Genie Networks Ltd. 5
6 calculated using peering fixed costs and the generated traffic information. A simple equation of potential monthly cost saving could be calculated by the example equation below. Figure 4.1: New peer cost analysis and evaluation The Monthly cost saved can be calculated simply by subtracting total peering fixed costs (transport cost to Internet Exchange, peering port costs, and exchange centre rentals) from the current transit costs (transit rate x potential saved traffic volume). The resulted Monthly cost saved needs to be equal or greater than zero for the peering relationship to benefit financially. GenieATM provides ISPs a comprehensive solution which quantifies the cost analysis for peering and largely simplifies the decision process. 5. Peer Monitoring The stability and reliability of a peer largely affects the quality and security of a network. An unstable peer could consume more network resource than originally planned. GenieATM monitors the peering relationships for ISPs to ensure the performance of existing peers. GenieATM offers breakdown reports on peer partners and monitors the BGP stability via the change in number of BGP messages exchanged and prefixes announced. Alerts are generated when an unusual, huge churn of number message updates occurs (figure 5.1) which usually signifies an unstable peer. GenieATM also provides traffic visibility which can be used to monitor the effect of traffic engineering after offloading traffic from a heavy loaded route. Genie Networks Ltd. 6
7 Figure 5.1: BGP Message monitoring and real-time alerts 6. Conclusion GenieATM provides ISPs with abundant traffic reports and peering analyses not only to identify the optimal peering partners but also to evaluate the technical and financial benefit of the new peer. GenieATM offers filter configuration and Top-N traffic reports which can be used to carry out various peering analyses to suit ISPs with different peering policies. New peering candidate can be found through the Top-N traffic report and the To / Thru traffic distribution. Top-N reports also provide the required information for cost analysis for new peer investment justification. The traffic distribution report provides BGP attributes information as reference for traffic engineering and through applying BGP policies to utilise network resources and avoid route congestion. In addition to traffic analysis, GenieATM monitors the stability and reliability of the existing peers to ensure the performance of route and network. GenieATM offers ISPs with a complete solution for peering analysis to suit various business modes and gives ISPs an enhanced network management and network optimisation. About Genie Networks Genie Networks is a leading provider of IP flow-based network traffic analysis and security solutions. Our GenieATM offers network-wide, cost-effective traffic visibility and threat detection, which optimizes operation and enhances revenue for fixed and mobile broadband operators. GenieATM s Network Behaviour Analysis-based (NBA-based) DDoS prevention capability enhances operators network infrastructure security in a network-wide scope. GenieATM product series encompasses, GenieATM Flow Load Balancer, and GenieATM MSP server, which are all developed specifically to serve tier-1 ISPs. Through on-going technology innovations, Genie Networks solutions have been market-proven by a number of tier-1 telecoms and blue-chip enterprises worldwide. To date over 1,000 GenieATM network appliances have been deployed serving over 450 customers worldwide. For more information, please visit Genie Networks Ltd. 7
Intelligent Routing Platform White Paper
White Paper Table of Contents 1. Executive Summary...3 2. The Challenge of a Multi-Homed Environment...4 3. Network Congestion and Blackouts...4 4. Intelligent Routing Platform...5 4.1 How It Works...5
More informationExterior Gateway Protocols (BGP)
Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection
More informationThe Value of Peering. ISP/IXP Workshops
The Value of Peering ISP/IXP Workshops 1 The Internet Internet is made up of ISPs of all shapes and sizes Some have local coverage (access providers) Others can provide regional or per country coverage
More informationBGP Attributes and Path Selection
BGP Attributes and Path Selection ISP Workshops Last updated 29 th March 2015 1 BGP Attributes BGP s policy tool kit 2 What Is an Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes
More informationBorder Gateway Protocol BGP4 (2)
Border Gateway Protocol BGP4 (2) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Presentation Outline Border Gateway Protocol - Continued Computer Networks - 1/2 Learning
More informationInternet Routing Protocols Lecture 04 BGP Continued
Internet Routing Protocols Lecture 04 BGP Continued Advanced Systems Topics Lent Term, 008 Timothy G. Griffin Computer Lab Cambridge UK Two Types of BGP Sessions AS External Neighbor (EBGP) in a different
More informationMPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud
MPLS WAN Explorer Enterprise Network Management Visibility through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN routing to MPLS VPN service
More informationIntroduction to Routing
Introduction to Routing How traffic flows on the Internet Philip Smith pfs@cisco.com RIPE NCC Regional Meeting, Moscow, 16-18 18 June 2004 1 Abstract Presentation introduces some of the terminologies used,
More informationHighly Available Unified Communication Services with Microsoft Lync Server 2013 and Radware s Application Delivery Solution
Highly Available Unified Communication Services with Microsoft Lync Server 2013 and Radware s Application Delivery Solution The Challenge Businesses that rely on Microsoft Lync Server must guarantee uninterrupted
More informationNetwork-Wide Capacity Planning with Route Analytics
with Route Analytics Executive Summary Capacity planning is an important business process in large IP networks for ensuring reliable application and service delivery. In the days of fixed circuits and
More informationFlow Analysis. Make A Right Policy for Your Network. GenieNRM
Flow Analysis Make A Right Policy for Your Network GenieNRM Why Flow Analysis? Resolve Network Managers Challenge as follow: How can I know the Detail and Real-Time situation of my network? How can I do
More informationRegaining MPLS VPN WAN Visibility with Route Analytics. Seeing through the MPLS VPN Cloud
Regaining MPLS VPN WAN Visibility with Route Analytics Seeing through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN connectivity to MPLS VPN
More informationSPAMfighter Mail Gateway
SPAMfighter Mail Gateway User Manual Copyright (c) 2009 SPAMfighter ApS Revised 2009-05-19 1 Table of contents 1. Introduction...3 2. Basic idea...4 2.1 Detect-and-remove...4 2.2 Power-through-simplicity...4
More informationThe Role IXPs and Peering Play in the Evolution of the Internet
The Role IXPs and Peering Play in the Evolution of the Internet PTC 14, New World, New Strategies, 19-22 January 2014 Steve Wilcox, President and CTO, IX Reach A Quick Introduction Steve Wilcox founded
More informationISPA Guidelines and Recommendations on Broadband Terminology
ISPA Guidelines and Recommendations on Broadband Terminology Version: 1.01 Date: 2011-06-27 1. Introduction The Internet Service Providers' Association (ISPA) has identified a need to develop a set of
More informationThe Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions
The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions This paper discusses the telephone network infrastructure commonly known as the Public Switched Telephone
More informationTRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing
TRUFFLE Broadband Bonding Network Appliance A Frequently Asked Question on Link Bonding vs. Load Balancing 5703 Oberlin Dr Suite 208 San Diego, CA 92121 P:888.842.1231 F: 858.452.1035 info@mushroomnetworks.com
More informationBUREAU EUROPÉEN DES UNIONS DE CONSOMMATEURS AISBL
BEREC report on IPinterconnection in the context of Net Neutrality BEUC statement Contact: Guillermo Beltra digital@beuc.eu Ref.: X/2012/062-09/08/2012 BUREAU EUROPÉEN DES UNIONS DE CONSOMMATEURS AISBL
More informationTraffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012
Traffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012 January 29th, 2008 Christian Kaufmann Director Network Architecture Akamai Technologies, Inc. way-back machine Web 1998 way-back
More informationInternet Service Providers: Peering and Charging
Internet Service Providers: Peering and Charging UZH HS14 Seminar Internet Economics Markus Cadonau, Sofia Orlova Overview ISP Relationships Internet Hierarchy Peering: Potential and Process Challenges
More informationEdge Configuration Series Reporting Overview
Reporting Edge Configuration Series Reporting Overview The Reporting portion of the Edge appliance provides a number of enhanced network monitoring and reporting capabilities. WAN Reporting Provides detailed
More informationNetFlow Tracker Overview. Mike McGrath x ccie CTO mike@crannog-software.com
NetFlow Tracker Overview Mike McGrath x ccie CTO mike@crannog-software.com 2006 Copyright Crannog Software www.crannog-software.com 1 Copyright Crannog Software www.crannog-software.com 2 LEVELS OF NETWORK
More informationE6998-02: Internet Routing
E6998-02: Internet Routing Lecture 13 Border Gateway Protocol, Part II John Ioannidis AT&T Labs Research ji+ir@cs.columbia.edu Copyright 2002 by John Ioannidis. All Rights Reserved. Announcements Lectures
More informationHP Networking BGP and MPLS technology training
Course overview HP Networking BGP and MPLS technology training (HL046_00429577) The HP Networking BGP and MPLS technology training provides networking professionals the knowledge necessary for designing,
More informationMeeting the Five Key Needs of Next-Generation Cloud Computing Networks with 10 GbE
White Paper Meeting the Five Key Needs of Next-Generation Cloud Computing Networks Cloud computing promises to bring scalable processing capacity to a wide range of applications in a cost-effective manner.
More informationHow More Specifics increase your transit bill (and ways to avoid it)
How More Specifics increase your transit bill (and ways to avoid it) Your Speaker Today... Fredy Künzler CTO & Founder kuenzler at init7.net www.init7.net www.blogg.ch www.bgp-and-beyond.com AS13030 Twitter:
More informationNetwork-Wide Change Management Visibility with Route Analytics
Network-Wide Change Management Visibility with Route Analytics Executive Summary Change management is a hot topic, and rightly so. Studies routinely report that a significant percentage of application
More informationService Provider Enablement 3.0 Achieving Accelerated Business Gain
Global Leader in DDoS Mitigation Service Provider Enablement 3.0 Achieving Accelerated Business Gain BENEFITS Comprehensive product range to capture different market segments Turnkey white-label partnership
More informationTeridion. Rethinking Network Performance. The Internet. Lightning Fast. Technical White Paper July, 2015 www.teridion.com
Teridion The Internet. Lightning Fast. Rethinking Network Performance Technical White Paper July, 2015 www.teridion.com Executive summary Online services face the growing dual challenge of supporting many
More informationBGP1 Multihoming and Traffic Engineering
83950 Telecommunications Laboratory Course BGP1 BGP1 Multihoming and Traffic Engineering date & time student # name 1 2 bgp-tyo.tex,v 1.11 2005/04/18 14:09:14 ams Exp 1/17 Part I Home Assignment 1 General
More informationAdvanced BGP Policy. Advanced Topics
Advanced BGP Policy George Wu TCOM690 Advanced Topics Route redundancy Load balancing Routing Symmetry 1 Route Optimization Issues Redundancy provide multiple alternate paths usually multiple connections
More informationThe Evolution of the U.S. Internet Peering Ecosystem
The Evolution of the U.S. Internet Peering Ecosystem William B. Norton Co-Founder and Chief Technical Liaison Equinix, Inc. NANOG 31 San Francisco, CA Peer Trek Internet Operations Research Research 5
More informationThe Value of Flow Data for Peering Decisions
The Value of Flow Data for Peering Decisions Hurricane Electric IPv6 Native Backbone Massive Peering! Martin J. Levy Director, IPv6 Strategy Hurricane Electric 22 nd August 2012 Introduction Goal of this
More informationIntelligent Policy Enforcement Solutions for Higher Education Institutions
Intelligent Policy Enforcement Solutions for Higher Education Institutions To do more with your campus network you need to see more. Imagine being able to view network activity down to the granular level,
More informationHow To Defend Your Position On Net Neutrality In A Berrycreeper Consultation
BT s Response to BEREC Consultation: An Assessment of IP-interconnection in the context of Net Neutrality 31/07/2012 1 Introduction 1. In the context of Net Neutrality, BT s response to BEREC s consultation
More informationAn overview on Internet Measurement Methodologies, Techniques and Tools
An overview on Internet Measurement Methodologies, Techniques and Tools AA 2012/2013 emiliano.casalicchio@uniroma2.it (Agenda) Lezione 24/04/2013 Part 1 Intro basic concepts ISP Traffic exchange (peering)
More informationInterdomain Routing. Outline
Interdomain Routing David Andersen 15-744 Spring 2007 Carnegie Mellon University Outline What does the Internet look like? Relationships between providers Enforced by: Export filters and import ranking
More informationThe fact is that 90% of business strategies are not implemented through operations as intended. Overview
Overview It is important to recognize that a company s network determines its supply chain efficiency and customer satisfaction. Designing an optimal supply chain network means the network must be able
More informationService Description DDoS Mitigation Service
Service Description DDoS Mitigation Service Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: info@interoute.com Contents Contents 1 Introduction...3 2 An Overview...3
More informationEXPERT STRATEGIES FOR LOG COLLECTION, ROOT CAUSE ANALYSIS, AND COMPLIANCE
EXPERT STRATEGIES FOR LOG COLLECTION, ROOT CAUSE ANALYSIS, AND COMPLIANCE A reliable, high-performance network is critical to your IT infrastructure and organization. Equally important to network performance
More informationBGP FORGOTTEN BUT USEFUL FEATURES. Piotr Wojciechowski (CCIE #25543)
BGP FORGOTTEN BUT USEFUL FEATURES Piotr Wojciechowski (CCIE #25543) ABOUT ME Senior Network Engineer MSO at VeriFone Inc. Previously Network Solutions Architect at one of top polish IT integrators CCIE
More informationIntegrating F5 Application Delivery Solutions with VMware View 4.5
APPLICATION READY SOLUTION GUIDE What s inside: 2 Improving user experience 2 Enhancing security and access control 3 Application Performance and Availability 4 F5 and global configuration diagram 5 More
More informationNetflix Open Connect Network. PTT Forum December 2012 Flavio Amaral (South America Network Strategy)
Netflix Open Connect Network PTT Forum December 2012 Flavio Amaral (South America Network Strategy) 1 Overview Introduction to Netflix Netflix in Brazil Peering and Plans for 2013 Open Connect, the Netflix
More informationInternet Traffic and Content Consolidation
Internet Traffic and Content Consolidation Craig Labovitz Chief Scientist, Arbor Networks S. Iekel-Johnson, D. McPherson Arbor Networks, Inc. J. Oberheide, F. Jahanian University of Michigan Talk Outline
More informationProCurve Networking IPv6 The Next Generation of Networking
ProCurve Networking The Next Generation of Networking Introduction... 2 Benefits from... 2 The Protocol... 3 Technology Features and Benefits... 4 Larger number of addresses... 4 End-to-end connectivity...
More informationL4: ISPs, Backbones and Peering
L4: ISPs, Backbones and Peering 15 September 2015 (From Kobe) Bill Nace Material from Computer Networking: A Top Down Approach, 5 th edition. J.F. Kurose and K.W. Ross Administrivia Norton2010 Paper Review
More informationRadware s Attack Mitigation Solution On-line Business Protection
Radware s Attack Mitigation Solution On-line Business Protection Table of Contents Attack Mitigation Layers of Defense... 3 Network-Based DDoS Protections... 3 Application Based DoS/DDoS Protection...
More informationTraffic & Peering Analysis
Traffic & Peering Analysis or how I learned to stop worrying and love route hijacking Pete Crocker pete@packetdesign.com Agenda Alternate methods of traffic / peering analysis Traffic Matrices Pros & Cons
More informationFAQ: BroadLink Multi-homing Load Balancers
FAQ: BroadLink Multi-homing Load Balancers BroadLink Overview Outbound Traffic Inbound Traffic Bandwidth Management Persistent Routing High Availability BroadLink Overview 1. What is BroadLink? BroadLink
More informationCCS (Leeds) Ltd. Leased Line Solutions
CCS (Leeds) Ltd Leased Line Solutions Our leased line services are provided with fully managed hardware, are pro-actively monitored at ten second intervals and transparently reported in real time in our
More informationCorporate Network Services of Tomorrow Business-Aware VPNs
Corporate Network Services of Tomorrow Business-Aware VPNs Authors: Daniel Kofman, CTO and Yuri Gittik, CSO Content Content...1 Introduction...2 Serving Business Customers: New VPN Requirements... 2 Evolution
More informationThe Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com. Google Public
The Value of Content Distribution Networks Mike Axelrod, Google axelrod@google.com Introduction Well understood facts: o Fast is better than slow but it costs more to be fast o Network has to be fast and
More informationTRUFFLE Broadband Bonding Network Appliance BBNA6401. A Frequently Asked Question on. Link Bonding vs. Load Balancing
TRUFFLE Broadband Bonding Network Appliance BBNA6401 A Frequently Asked Question on Link Bonding vs. Load Balancing LBRvsBBNAFeb15_08b 1 Question: What's the difference between a Truffle Broadband Bonding
More informationICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.
ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow
More informationMultiscreen Video Processing Monetisation
Application Note September 2013 Multiscreen Video Processing Monetisation Multiscreen up-ends existing TV business models, but at the same time the unicast nature of OTT delivery provides opportunities
More informationThe Emerging 21 st Century Access Power Peering (*)
The Emerging 21 st Century Access Power Peering (*) William B. NORTON DrPeering International, Palo Alto, CA USA Abstract: From the beginning of the Internet as a government-funded network of networks
More informationTraffic Monitoring : Experience
Traffic Monitoring : Experience Objectives Lebah Net To understand who and/or what the threats are To understand attacker operation Originating Host Motives (purpose of access) Tools and Techniques Who
More informationGlobal IP Network Mobility
Brian L. Skeen brian.l.skeen@boeing.com Global IP Network Mobility using Border Gateway Protocol (BGP) BGP Network Mobility Connexion Service Summary Current IP Mobility standards Network and Service Challenges
More informationNetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6
(Integrated) Technology White Paper Issue 01 Date 2012-9-6 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means
More informationC C S ( L e e d s ) L t d
C C S ( L e e d s ) L t d L E A S E D L I N E S O L U T I O N S L E A S E D L I N E S E R V I C E S Leased line services from CCS Leeds will provide your company with bespoke solutions to ensure that your
More informationMultihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
More informationIAB IPv6 Multi-Homing BOF. Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI
IAB IPv6 Multi-Homing BOF Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI Multi-homing Problems Inbound to the destination traffic engineering is needed Current
More informationB Series Personal Notification via SMS and Email
Security Systems Abstract B Series Personal Notification via SMS and Email White Paper The Bosch B Series control panel version 2.00 introduced the ability for end users of the system to receive emails
More informationAnalyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP
Telfor Journal, Vol. 2, No. 1, 2010. 13 Analyzing Capabilities of Commercial and Open-Source Routers to Implement Atomic BGP Aleksandar Cvjetić and Aleksandra Smiljanić Abstract The paper analyzes implementations
More informationDD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA
DD2491 p1 2008 Load balancing BGP Johan Nicklasson KTHNOC/NADA Dual home When do you need to be dual homed? How should you be dual homed? Same provider. Different providers. What do you need to have in
More informationWHITE PAPER. Gaining Total Visibility for Lawful Interception
WHITE PAPER Gaining Total Visibility for Lawful Interception www.ixiacom.com 915-6910-01 Rev. A, July 2014 2 Table of Contents The Purposes of Lawful Interception... 4 Wiretapping in the Digital Age...
More informationTraffic Analysis With Netflow. The Key to Network Visibility
Summary Today, Enterprises know that the WAN is one of their most important assets. It needs to be up and running 24x7 for the enterprise to function smoothly. To make this possible, IT administrators
More informationExpert Reference Series of White Papers. The Basics of Configuring and Using Cisco Network Address Translation
Expert Reference Series of White Papers The Basics of Configuring and Using Cisco Network Address Translation 1-800-COURSES www.globalknowledge.com The Basics of Configuring and Using Cisco Network Address
More informationDisaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs
Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more
More informationEnhancing Network Monitoring with Route Analytics
with Route Analytics Executive Summary IP networks are critical infrastructure, transporting application and service traffic that powers productivity and customer revenue. Yet most network operations departments
More informationVyatta Network OS for Network Virtualization
Complete Security and Compliance for Virtual Environments Vyatta takes the concept of virtualization beyond just applications and operating systems and allows enterprise IT to also virtualize network components
More informationPeering in Hong Kong. Che-Hoo CHENG CUHK/HKIX www.hkix.net
Peering in Hong Kong Che-Hoo CHENG CUHK/HKIX www.hkix.net How Internet Operates in simple terms Internet is composed of networks of ISPs and users User networks connect to ISPs Small ISPs connect to large
More informationAPNIC elearning: BGP Basics. Contact: training@apnic.net. erou03_v1.0
erou03_v1.0 APNIC elearning: BGP Basics Contact: training@apnic.net Overview What is BGP? BGP Features Path Vector Routing Protocol Peering and Transit BGP General Operation BGP Terminology BGP Attributes
More informationFounded in 2003, Worldwebnet Telecom is a fast growing Canadian owned and operated carrier that specializes in providing voice services to the
Founded in 2003, Worldwebnet Telecom is a fast growing Canadian owned and operated carrier that specializes in providing voice services to the wholesale, retail and business markets. Carrier Services Access
More informationVerizon Business International Partner Services. Wholesale & Carrier Guide
Verizon Business International Partner Services Wholesale & Carrier Guide Verizon Business International Partner Services Partnership that builds your business Verizon Business is a leading provider of
More informationTroubleshooting Application Performance Issues Across MPLS Networks
Troubleshooting Application Performance Issues Across MPLS Networks Bob Quillin,, VP Product Management, Network Physics bobq@networkphysics.com 1 MPLSCon 2005, New York Today s Agenda Background Brief
More informationThe Distributed Cloud: Automating, Scaling, Securing & Orchestrating the Edge
White Paper The Distributed Cloud: Automating, Scaling, Securing & Orchestrating the Edge Prepared by Jim Hodges Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.juniper.net October
More informationJ-Flow on J Series Services Routers and Branch SRX Series Services Gateways
APPLICATION NOTE Juniper Flow Monitoring J-Flow on J Series Services Routers and Branch SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE - Juniper Flow Monitoring
More informationChapter 3 Security and Firewall Protection
Chapter 3 Security and Firewall Protection This chapter describes how to use the basic firewall features of the ADSL2+ Modem Router to protect your network. Firewall Settings You can set up the ADSL2+
More informationThe Application Front End Understanding Next-Generation Load Balancing Appliances
White Paper Overview To accelerate download times for end users and provide a high performance, highly secure foundation for Web-enabled content and applications, networking functions need to be streamlined.
More informationSource-Connect Network Configuration Last updated May 2009
Source-Connect Network Configuration Last updated May 2009 For further support: Chicago: +1 312 706 5555 London: +44 20 7193 3700 support@source-elements.com This document is designed to assist IT/Network
More informationIP Network Control: Turning an Art into a Science. Case Study: Global Crossing
Case Study: Global Crossing IP Network Control: Turning an Art into a Science Company: Industry: Global Crossing Holdings Ltd. Telecommunications Challenge(s): Global Crossing want the visibility and control
More informationEffective BGP Load Balancing Using "The Metric System" A real-world guide to BGP traffic engineering
Effective BGP Load Balancing Using "The Metric System" A real-world guide to BGP traffic engineering NANOG45 January 26, 2009 Dani Roisman droisman ~ at ~ peakwebconsulting.com Introductions Slide 1 Why
More informationCS 40, Lecture 3: Internet economics. Ramesh Johari
CS 40, Lecture 3: Internet economics Ramesh Johari Outline Contracts: transit and peer Example 1: Peering and pricing Example 2: Exchanges Example 3: Hot potato routing Example 4: 95 th percentile pricing
More informationMaking the Internet fast, reliable and secure. DE-CIX Customer Summit - 2014. Steven Schecter <schecter@akamai.com>
Making the Internet fast, reliable and secure DE-CIX Customer Summit - 2014 Steven Schecter What is a Content Distribution Network RFCs and Internet Drafts define a CDN as: Content
More informationChapter 49 Border Gateway Protocol version 4 (BGP-4)
Chapter 49 Border Gateway Protocol version 4 (BGP-4) Introduction... 1-3 Overview of BGP-4... 1-3 BGP Operation... 1-5 BGP Attributes... 1-6 BGP Route Selection... 1-8 Classless Inter-domain Routing (CIDR)
More informationThe rise of the hybrid network model
The rise of the hybrid network model Hybrid networks offer the promise of greater flexibility and capacity, improved application performance and cheaper price points than traditional Wide Area Networks
More informationQuick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? Websense Network Agent software monitors all internet traffic on the machines that you assign to it. Network Agent filters HTTP traffic and more than 70 other popular internet protocols,
More informationTruffle Broadband Bonding Network Appliance
Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive
More informationLead management solution. Tobias Kuen SC-Networks GmbH, Managing Director
Lead management Lead management solution evalanche is now targeting companies that not only want to benefit from a powerful e-mail marketing solution, but also want to support Marketing and Sales with
More informationHow Route Analytics Enables Virtualization and Cloud Computing
How Route Analytics Enables Virtualization and Cloud Computing By Jim Metzler, Ashton Metzler & Associates Distinguished Research Fellow and Co-Founder, Webtorials Editorial/Analyst Division Introduction
More informationEffective BGP Load Balancing Using "The Metric System" A real-world guide to BGP traffic engineering
Effective BGP Load Balancing Using "The Metric System" A real-world guide to BGP traffic engineering NANOG46 June 14, 2009 Dani Roisman droisman ~ at ~ peakwebconsulting ~ dot ~ com Introductions Slide
More informationMicrosoft Exchange Load Balancing. Unique Applied Patent Technology By XRoads Networks
Microsoft Exchange Load Balancing Unique Applied Patent Technology By XRoads Networks Microsoft Exchange Server Balancing The following is an introduction and overview as to how the EdgeXOS appliances
More informationGlobal Network Mobility NANOG 31
Ben Abarbanel cbbrouting@boeing.com Global Network Mobility NANOG 31 Implementing Global Network Mobility What is Connexion by Boeing? Summary of the problem Network and Service Challenges BGP as a mobility
More informationInternet Ecosystem. Staffan Göjeryd Vice President Product Management, Head of Operators TeliaSonera Broadband Services
Internet Ecosystem Staffan Göjeryd Vice President Product Management, Head of Operators TeliaSonera Broadband Services Explaining the Internet Ecosystem How is the Internet wired? Is Content King? Hot
More informationIntroduction. The Inherent Unpredictability of IP Networks # $# #
Introduction " $ % & ' The Inherent Unpredictability of IP Networks A major reason that IP became the de facto worldwide standard for data communications networks is its automated resiliency based on intelligent
More informationPartner with the UK s leading. Managed Security Service Provider
Partner with the UK s leading Managed Security Service Provider The Talk Straight Advantage Established in 2007, Talk Straight is an ISP with a difference, and is at the forefront of a revolution in cloud
More informationDeployment Guide: Transparent Mode
Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This
More informationNovaTel The Next Generation Carrier
NovaTel The Next Generation Carrier The network is the core of your business and our network is built to withstand the most demanding requirements. Designed for tomorrow s needs, NovaTel s network is engineered
More information